2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) 2016
DOI: 10.1109/dsn.2016.60
|View full text |Cite
|
Sign up to set email alerts
|

fuzzyPSM: A New Password Strength Meter Using Fuzzy Probabilistic Context-Free Grammars

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
34
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 55 publications
(37 citation statements)
references
References 30 publications
1
34
0
Order By: Relevance
“…Much research [13,16,23,30,33] has therefore been done to develop more robust PSMs so that the estimated password strength matches the actual risk against password crackers better.…”
Section: Related Workmentioning
confidence: 99%
“…Much research [13,16,23,30,33] has therefore been done to develop more robust PSMs so that the estimated password strength matches the actual risk against password crackers better.…”
Section: Related Workmentioning
confidence: 99%
“…Markov-based PSM [28] and PCFG-based PSM [18] were proposed subsequently based on Markov model and PCFG model. Wang et al [12] created a novel PSM on a solid foundation where user usually reuses one of his/her passwords rather than creating a new one. By using two training sets (one as base dictionary and the other as rule learning dictionary), their PSM was able to derive empirically users' mangling rules on passwords and thus more accurate.…”
Section: Related Workmentioning
confidence: 99%
“…We attempt to expand our work by utilizing modification-based relationship between passwords (other relationships we have explored above are still worth deeper research and we leave it for future work). Prior surveys have already provided us with plenty of information on how users modify their passwords: adding digits or symbols at the beginning/end of password, capitalizing a letter, Leet transformation, and so forth [9,12,32,37]. Taking the permitted operations for each type of edit distance into consideration synthetically, we could infer that LD is currently the most appropriate measure of password relationship among all types of edit distance, which actually models real-world users' mangling behaviors (insertion, deletion, and substitution are popular while transposition is not).…”
Section: Rationalementioning
confidence: 99%
See 1 more Smart Citation
“…A mass of research [1][2][3][4][5] focuses on passwords mechanism and other authentication mechanisms for user authentication in various computer systems. But recently, with the rapid development of microblogging, the scale of users is becoming larger and larger.…”
Section: Introductionmentioning
confidence: 99%